General

  • Target

    2024-06-05_63f02e35eba6f9f08c118658b70eba03_cryptolocker

  • Size

    50KB

  • MD5

    63f02e35eba6f9f08c118658b70eba03

  • SHA1

    d1dcaceb649c7ebf4fe8ef39a7ed88378185f387

  • SHA256

    9d18596d6c248e25e2227dc5841c0c42f3dc360aa6cc3c6d65a32cf6a4725e6f

  • SHA512

    0cb4afcac5083b4feab760bbaa736de7d93ce6fd02bf2720c83722fa4521d7b99252cfa0579e8169c080a7f426d7c5dd940e6b9b08928bf5f31b7b9ce08136fc

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocbK:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_63f02e35eba6f9f08c118658b70eba03_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections